Ciberdelincuentes atacan a bufetes de abogados con el malware GootLoader y FakeUpdatesSeis bufetes de abogados diferentes fueron atacados en enero y febrero de 2023 como parte...
Day: March 5, 2023
Vulnerabilidad crítica en Oracle WebLogic (CVE-2023-21839)
Vulnerabilidad crítica en Oracle WebLogic (CVE-2023-21839)Se ha publicado el código de explotación para una vulnerabilidad crítica en Oracle WebLogic Server. La vulnerabilidad, identificada como CVE-2023-21839 […]Leer...
Informe anual de seguridad del Browser Security revela los principales riesgos y puntos ciegos de la navegación
Informe anual de seguridad del Browser Security revela los principales riesgos y puntos ciegos de la navegaciónComo interfaz de trabajo principal, el navegador juega un papel...
Cisco parcha falla crítica de Web UI RCE en múltiples teléfonos IP
Cisco parcha falla crítica de Web UI RCE en múltiples teléfonos IPCisco ha abordado una vulnerabilidad de seguridad crítica que se encuentra en la interfaz de...
La Agencia de Ciberseguridad de EE.UU. da la voz de alarma sobre las capacidades letales de Royal Ransomware
La Agencia de Ciberseguridad de EE.UU. da la voz de alarma sobre las capacidades letales de Royal RansomwareLa Agencia de Seguridad de Infraestructura y Ciberseguridad de...
Vulnerabilidad crítica en Oracle WebLogic (CVE-2023-21839)
Vulnerabilidad crítica en Oracle WebLogic (CVE-2023-21839)Se ha publicado el código de explotación para una vulnerabilidad crítica en Oracle WebLogic Server. La vulnerabilidad, identificada como CVE-2023-21839 […]Leer...
2023 Browser Security Report Uncovers Major Browsing Risks and Blind Spots
2023 Browser Security Report Uncovers Major Browsing Risks and Blind SpotsAs a primary working interface, the browser plays a significant role in today's corporate environment. The...
Clustering Phishing Campaign’s Rogue and Fraudulent and Malicious Hosting Infrastructure Pointing to Massive IPFS Web 3.0 Hosting Infrastructure Abuse – An OSINT Analysis
Clustering Phishing Campaign’s Rogue and Fraudulent and Malicious Hosting Infrastructure Pointing to Massive IPFS Web 3.0 Hosting Infrastructure Abuse – An OSINT Analysis Dear blog readers,...
USENIX Security ’22 – Jiaheng Zhang , Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang – ‘Polynomial Commitment with a One-to-Many Prover and Applications’
USENIX Security ’22 – Jiaheng Zhang , Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang – ‘Polynomial Commitment with a One-to-Many Prover and Applications’Our thanks to...
Autonomous Vehicles Need No Drugs Or Drink To Be Bad Drivers
Autonomous Vehicles Need No Drugs Or Drink To Be Bad DriversHumans often get cited for being influenced by drugs or alcohol when they make terrible decisions....
USENIX Security ’22 – Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Yale University; Xiao Wang – ‘ppSAT: Towards Two-Party Private SAT Solving’
USENIX Security ’22 – Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Yale University; Xiao Wang – ‘ppSAT: Towards Two-Party Private SAT Solving’Our thanks to USENIX...
Play Ransomware gang has begun to leak data stolen from City of Oakland
Play Ransomware gang has begun to leak data stolen from City of OaklandThe Play ransomware gang has finally begun to leak the data stolen from the...
New cyberattack tactics rise up as ransomware payouts increase
New cyberattack tactics rise up as ransomware payouts increaseWhile phishing, business email compromise (BEC), and ransomware still rank among the most popular cyberattack techniques, a mix...
BidenCash leaks 2.1M stolen credit/debit cards
BidenCash leaks 2.1M stolen credit/debit cardsThe dark web carding site BidenCash recently leaked for free a collection of approximately 2 million stolen payment card numbers. An...
FiXS, a new ATM malware that is targeting Mexican banks
FiXS, a new ATM malware that is targeting Mexican banksResearchers at Metabase Q discovered a new ATM malware, dubbed FiXS, that was employed in attacks against Mexican banks...
Security Affairs newsletter Round 409 by Pierluigi Paganini
Security Affairs newsletter Round 409 by Pierluigi PaganiniA new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are...
Malware: 5 Tips for Fighting the Malicious Software
Malware: 5 Tips for Fighting the Malicious Software Malware—the term seems to be at the center of the news every day, with each headline telling of...
McAfee Awarded Best Protection by the Labs at AV-TEST
McAfee Awarded Best Protection by the Labs at AV-TEST Each year the independent labs at AV-TEST announce their best products in IT security, and McAfee has...
New TPM 2.0 flaws could let hackers steal cryptographic keys
New TPM 2.0 flaws could let hackers steal cryptographic keysThe Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow...
Bing Chat has a secret ‘Celebrity’ mode to impersonate celebrities
Bing Chat has a secret ‘Celebrity’ mode to impersonate celebritiesA secret Bing Chat 'Celebrity' mode allows users to instruct the AI to impersonate celebrities, answering questions...
Ransomware gang leaks data stolen from City of Oakland
Ransomware gang leaks data stolen from City of OaklandThe Play ransomware gang has begun to leak data from the City of Oakland, California, that was stolen...